docker_cli_run_unix_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470
  1. // +build !windows
  2. package main
  3. import (
  4. "bufio"
  5. "fmt"
  6. "io/ioutil"
  7. "os"
  8. "os/exec"
  9. "path/filepath"
  10. "regexp"
  11. "strconv"
  12. "strings"
  13. "time"
  14. "github.com/docker/docker/pkg/integration/checker"
  15. "github.com/docker/docker/pkg/mount"
  16. "github.com/docker/docker/pkg/parsers"
  17. "github.com/docker/docker/pkg/sysinfo"
  18. "github.com/go-check/check"
  19. "github.com/kr/pty"
  20. )
  21. // #6509
  22. func (s *DockerSuite) TestRunRedirectStdout(c *check.C) {
  23. checkRedirect := func(command string) {
  24. _, tty, err := pty.Open()
  25. c.Assert(err, checker.IsNil, check.Commentf("Could not open pty"))
  26. cmd := exec.Command("sh", "-c", command)
  27. cmd.Stdin = tty
  28. cmd.Stdout = tty
  29. cmd.Stderr = tty
  30. c.Assert(cmd.Start(), checker.IsNil)
  31. ch := make(chan error)
  32. go func() {
  33. ch <- cmd.Wait()
  34. close(ch)
  35. }()
  36. select {
  37. case <-time.After(10 * time.Second):
  38. c.Fatal("command timeout")
  39. case err := <-ch:
  40. c.Assert(err, checker.IsNil, check.Commentf("wait err"))
  41. }
  42. }
  43. checkRedirect(dockerBinary + " run -i busybox cat /etc/passwd | grep -q root")
  44. checkRedirect(dockerBinary + " run busybox cat /etc/passwd | grep -q root")
  45. }
  46. // Test recursive bind mount works by default
  47. func (s *DockerSuite) TestRunWithVolumesIsRecursive(c *check.C) {
  48. // /tmp gets permission denied
  49. testRequires(c, NotUserNamespace)
  50. tmpDir, err := ioutil.TempDir("", "docker_recursive_mount_test")
  51. c.Assert(err, checker.IsNil)
  52. defer os.RemoveAll(tmpDir)
  53. // Create a temporary tmpfs mount.
  54. tmpfsDir := filepath.Join(tmpDir, "tmpfs")
  55. c.Assert(os.MkdirAll(tmpfsDir, 0777), checker.IsNil, check.Commentf("failed to mkdir at %s", tmpfsDir))
  56. c.Assert(mount.Mount("tmpfs", tmpfsDir, "tmpfs", ""), checker.IsNil, check.Commentf("failed to create a tmpfs mount at %s", tmpfsDir))
  57. f, err := ioutil.TempFile(tmpfsDir, "touch-me")
  58. c.Assert(err, checker.IsNil)
  59. defer f.Close()
  60. runCmd := exec.Command(dockerBinary, "run", "--name", "test-data", "--volume", fmt.Sprintf("%s:/tmp:ro", tmpDir), "busybox:latest", "ls", "/tmp/tmpfs")
  61. out, _, _, err := runCommandWithStdoutStderr(runCmd)
  62. c.Assert(err, checker.IsNil)
  63. c.Assert(out, checker.Contains, filepath.Base(f.Name()), check.Commentf("Recursive bind mount test failed. Expected file not found"))
  64. }
  65. func (s *DockerSuite) TestRunDeviceDirectory(c *check.C) {
  66. testRequires(c, DaemonIsLinux, NotUserNamespace)
  67. if _, err := os.Stat("/dev/snd"); err != nil {
  68. c.Skip("Host does not have /dev/snd")
  69. }
  70. out, _ := dockerCmd(c, "run", "--device", "/dev/snd:/dev/snd", "busybox", "sh", "-c", "ls /dev/snd/")
  71. c.Assert(strings.Trim(out, "\r\n"), checker.Contains, "timer", check.Commentf("expected output /dev/snd/timer"))
  72. out, _ = dockerCmd(c, "run", "--device", "/dev/snd:/dev/othersnd", "busybox", "sh", "-c", "ls /dev/othersnd/")
  73. c.Assert(strings.Trim(out, "\r\n"), checker.Contains, "seq", check.Commentf("expected output /dev/othersnd/seq"))
  74. }
  75. // TestRunDetach checks attaching and detaching with the escape sequence.
  76. func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
  77. name := "attach-detach"
  78. cmd := exec.Command(dockerBinary, "run", "--name", name, "-it", "busybox", "cat")
  79. stdout, err := cmd.StdoutPipe()
  80. c.Assert(err, checker.IsNil)
  81. cpty, tty, err := pty.Open()
  82. c.Assert(err, checker.IsNil)
  83. defer cpty.Close()
  84. cmd.Stdin = tty
  85. c.Assert(cmd.Start(), checker.IsNil)
  86. c.Assert(waitRun(name), check.IsNil)
  87. _, err = cpty.Write([]byte("hello\n"))
  88. c.Assert(err, checker.IsNil)
  89. out, err := bufio.NewReader(stdout).ReadString('\n')
  90. c.Assert(err, checker.IsNil)
  91. c.Assert(strings.TrimSpace(out), checker.Equals, "hello")
  92. // escape sequence
  93. _, err = cpty.Write([]byte{16})
  94. c.Assert(err, checker.IsNil)
  95. time.Sleep(100 * time.Millisecond)
  96. _, err = cpty.Write([]byte{17})
  97. c.Assert(err, checker.IsNil)
  98. ch := make(chan struct{})
  99. go func() {
  100. cmd.Wait()
  101. ch <- struct{}{}
  102. }()
  103. running, err := inspectField(name, "State.Running")
  104. c.Assert(err, checker.IsNil)
  105. c.Assert(running, checker.Equals, "true", check.Commentf("expected container to still be running"))
  106. go func() {
  107. exec.Command(dockerBinary, "kill", name).Run()
  108. }()
  109. select {
  110. case <-ch:
  111. case <-time.After(10 * time.Millisecond):
  112. c.Fatal("timed out waiting for container to exit")
  113. }
  114. }
  115. func (s *DockerSuite) TestRunWithCPUQuota(c *check.C) {
  116. testRequires(c, cpuCfsQuota)
  117. file := "/sys/fs/cgroup/cpu/cpu.cfs_quota_us"
  118. out, _ := dockerCmd(c, "run", "--cpu-quota", "8000", "--name", "test", "busybox", "cat", file)
  119. c.Assert(strings.TrimSpace(out), checker.Equals, "8000")
  120. out, err := inspectField("test", "HostConfig.CpuQuota")
  121. c.Assert(err, check.IsNil)
  122. c.Assert(out, checker.Equals, "8000", check.Commentf("setting the CPU CFS quota failed"))
  123. }
  124. func (s *DockerSuite) TestRunWithCpuPeriod(c *check.C) {
  125. testRequires(c, cpuCfsPeriod)
  126. file := "/sys/fs/cgroup/cpu/cpu.cfs_period_us"
  127. out, _ := dockerCmd(c, "run", "--cpu-period", "50000", "--name", "test", "busybox", "cat", file)
  128. c.Assert(strings.TrimSpace(out), checker.Equals, "50000")
  129. out, err := inspectField("test", "HostConfig.CpuPeriod")
  130. c.Assert(err, check.IsNil)
  131. c.Assert(out, checker.Equals, "50000", check.Commentf("setting the CPU CFS period failed"))
  132. }
  133. func (s *DockerSuite) TestRunWithKernelMemory(c *check.C) {
  134. testRequires(c, kernelMemorySupport)
  135. file := "/sys/fs/cgroup/memory/memory.kmem.limit_in_bytes"
  136. stdout, _, _ := dockerCmdWithStdoutStderr(c, "run", "--kernel-memory", "50M", "--name", "test1", "busybox", "cat", file)
  137. c.Assert(strings.TrimSpace(stdout), checker.Equals, "52428800")
  138. out, err := inspectField("test1", "HostConfig.KernelMemory")
  139. c.Assert(err, check.IsNil)
  140. c.Assert(out, check.Equals, "52428800")
  141. out, _, err = dockerCmdWithError("run", "--kernel-memory", "-16m", "--name", "test2", "busybox", "echo", "test")
  142. expected := "invalid size"
  143. c.Assert(err, check.NotNil)
  144. c.Assert(out, checker.Contains, expected)
  145. }
  146. func (s *DockerSuite) TestRunWithCPUShares(c *check.C) {
  147. testRequires(c, cpuShare)
  148. file := "/sys/fs/cgroup/cpu/cpu.shares"
  149. out, _ := dockerCmd(c, "run", "--cpu-shares", "1000", "--name", "test", "busybox", "cat", file)
  150. c.Assert(strings.TrimSpace(out), checker.Equals, "1000")
  151. out, err := inspectField("test", "HostConfig.CPUShares")
  152. c.Assert(err, check.IsNil)
  153. c.Assert(out, check.Equals, "1000")
  154. }
  155. // "test" should be printed
  156. func (s *DockerSuite) TestRunEchoStdoutWithCPUSharesAndMemoryLimit(c *check.C) {
  157. testRequires(c, cpuShare)
  158. testRequires(c, memoryLimitSupport)
  159. out, _, _ := dockerCmdWithStdoutStderr(c, "run", "--cpu-shares", "1000", "-m", "32m", "busybox", "echo", "test")
  160. c.Assert(out, checker.Equals, "test\n", check.Commentf("container should've printed 'test'"))
  161. }
  162. func (s *DockerSuite) TestRunWithCpusetCpus(c *check.C) {
  163. testRequires(c, cgroupCpuset)
  164. file := "/sys/fs/cgroup/cpuset/cpuset.cpus"
  165. out, _ := dockerCmd(c, "run", "--cpuset-cpus", "0", "--name", "test", "busybox", "cat", file)
  166. c.Assert(strings.TrimSpace(out), checker.Equals, "0")
  167. out, err := inspectField("test", "HostConfig.CpusetCpus")
  168. c.Assert(err, check.IsNil)
  169. c.Assert(out, check.Equals, "0")
  170. }
  171. func (s *DockerSuite) TestRunWithCpusetMems(c *check.C) {
  172. testRequires(c, cgroupCpuset)
  173. file := "/sys/fs/cgroup/cpuset/cpuset.mems"
  174. out, _ := dockerCmd(c, "run", "--cpuset-mems", "0", "--name", "test", "busybox", "cat", file)
  175. c.Assert(strings.TrimSpace(out), checker.Equals, "0")
  176. out, err := inspectField("test", "HostConfig.CpusetMems")
  177. c.Assert(err, check.IsNil)
  178. c.Assert(out, check.Equals, "0")
  179. }
  180. func (s *DockerSuite) TestRunWithBlkioWeight(c *check.C) {
  181. testRequires(c, blkioWeight)
  182. file := "/sys/fs/cgroup/blkio/blkio.weight"
  183. out, _ := dockerCmd(c, "run", "--blkio-weight", "300", "--name", "test", "busybox", "cat", file)
  184. c.Assert(strings.TrimSpace(out), checker.Equals, "300")
  185. out, err := inspectField("test", "HostConfig.BlkioWeight")
  186. c.Assert(err, check.IsNil)
  187. c.Assert(out, check.Equals, "300")
  188. }
  189. func (s *DockerSuite) TestRunWithBlkioInvalidWeight(c *check.C) {
  190. testRequires(c, blkioWeight)
  191. out, _, err := dockerCmdWithError("run", "--blkio-weight", "5", "busybox", "true")
  192. c.Assert(err, check.NotNil, check.Commentf(out))
  193. expected := "Range of blkio weight is from 10 to 1000"
  194. c.Assert(out, checker.Contains, expected)
  195. }
  196. func (s *DockerSuite) TestRunWithBlkioInvalidWeightDevice(c *check.C) {
  197. testRequires(c, blkioWeight)
  198. out, _, err := dockerCmdWithError("run", "--blkio-weight-device", "/dev/sda:5", "busybox", "true")
  199. c.Assert(err, check.NotNil, check.Commentf(out))
  200. }
  201. func (s *DockerSuite) TestRunWithBlkioInvalidDeivceReadBps(c *check.C) {
  202. testRequires(c, blkioWeight)
  203. out, _, err := dockerCmdWithError("run", "--device-read-bps", "/dev/sda:500", "busybox", "true")
  204. c.Assert(err, check.NotNil, check.Commentf(out))
  205. }
  206. func (s *DockerSuite) TestRunWithBlkioInvalidDeviceWriteBps(c *check.C) {
  207. testRequires(c, blkioWeight)
  208. out, _, err := dockerCmdWithError("run", "--device-write-bps", "/dev/sda:500", "busybox", "true")
  209. c.Assert(err, check.NotNil, check.Commentf(out))
  210. }
  211. func (s *DockerSuite) TestRunOOMExitCode(c *check.C) {
  212. testRequires(c, oomControl)
  213. errChan := make(chan error)
  214. go func() {
  215. defer close(errChan)
  216. //changing memory to 40MB from 4MB due to an issue with GCCGO that test fails to start the container.
  217. out, exitCode, _ := dockerCmdWithError("run", "-m", "40MB", "busybox", "sh", "-c", "x=a; while true; do x=$x$x$x$x; done")
  218. if expected := 137; exitCode != expected {
  219. errChan <- fmt.Errorf("wrong exit code for OOM container: expected %d, got %d (output: %q)", expected, exitCode, out)
  220. }
  221. }()
  222. select {
  223. case err := <-errChan:
  224. c.Assert(err, check.IsNil)
  225. case <-time.After(600 * time.Second):
  226. c.Fatal("Timeout waiting for container to die on OOM")
  227. }
  228. }
  229. func (s *DockerSuite) TestRunWithMemoryLimit(c *check.C) {
  230. testRequires(c, memoryLimitSupport)
  231. file := "/sys/fs/cgroup/memory/memory.limit_in_bytes"
  232. stdout, _, _ := dockerCmdWithStdoutStderr(c, "run", "-m", "32M", "--name", "test", "busybox", "cat", file)
  233. c.Assert(strings.TrimSpace(stdout), checker.Equals, "33554432")
  234. out, err := inspectField("test", "HostConfig.Memory")
  235. c.Assert(err, check.IsNil)
  236. c.Assert(out, check.Equals, "33554432")
  237. }
  238. // TestRunWithoutMemoryswapLimit sets memory limit and disables swap
  239. // memory limit, this means the processes in the container can use
  240. // 16M memory and as much swap memory as they need (if the host
  241. // supports swap memory).
  242. func (s *DockerSuite) TestRunWithoutMemoryswapLimit(c *check.C) {
  243. testRequires(c, DaemonIsLinux)
  244. testRequires(c, memoryLimitSupport)
  245. testRequires(c, swapMemorySupport)
  246. dockerCmd(c, "run", "-m", "32m", "--memory-swap", "-1", "busybox", "true")
  247. }
  248. func (s *DockerSuite) TestRunWithSwappiness(c *check.C) {
  249. testRequires(c, memorySwappinessSupport)
  250. file := "/sys/fs/cgroup/memory/memory.swappiness"
  251. out, _ := dockerCmd(c, "run", "--memory-swappiness", "0", "--name", "test", "busybox", "cat", file)
  252. c.Assert(strings.TrimSpace(out), checker.Equals, "0")
  253. out, err := inspectField("test", "HostConfig.MemorySwappiness")
  254. c.Assert(err, check.IsNil)
  255. c.Assert(out, check.Equals, "0")
  256. }
  257. func (s *DockerSuite) TestRunWithSwappinessInvalid(c *check.C) {
  258. testRequires(c, memorySwappinessSupport)
  259. out, _, err := dockerCmdWithError("run", "--memory-swappiness", "101", "busybox", "true")
  260. c.Assert(err, check.NotNil)
  261. expected := "Valid memory swappiness range is 0-100"
  262. c.Assert(out, checker.Contains, expected, check.Commentf("Expected output to contain %q, not %q", out, expected))
  263. out, _, err = dockerCmdWithError("run", "--memory-swappiness", "-10", "busybox", "true")
  264. c.Assert(err, check.NotNil)
  265. c.Assert(out, checker.Contains, expected, check.Commentf("Expected output to contain %q, not %q", out, expected))
  266. }
  267. func (s *DockerSuite) TestRunWithMemoryReservation(c *check.C) {
  268. testRequires(c, memoryReservationSupport)
  269. file := "/sys/fs/cgroup/memory/memory.soft_limit_in_bytes"
  270. out, _ := dockerCmd(c, "run", "--memory-reservation", "200M", "--name", "test", "busybox", "cat", file)
  271. c.Assert(strings.TrimSpace(out), checker.Equals, "209715200")
  272. out, err := inspectField("test", "HostConfig.MemoryReservation")
  273. c.Assert(err, check.IsNil)
  274. c.Assert(out, check.Equals, "209715200")
  275. }
  276. func (s *DockerSuite) TestRunWithMemoryReservationInvalid(c *check.C) {
  277. testRequires(c, memoryLimitSupport)
  278. testRequires(c, memoryReservationSupport)
  279. out, _, err := dockerCmdWithError("run", "-m", "500M", "--memory-reservation", "800M", "busybox", "true")
  280. c.Assert(err, check.NotNil)
  281. expected := "Minimum memory limit should be larger than memory reservation limit"
  282. c.Assert(strings.TrimSpace(out), checker.Contains, expected, check.Commentf("run container should fail with invalid memory reservation"))
  283. }
  284. func (s *DockerSuite) TestStopContainerSignal(c *check.C) {
  285. out, _ := dockerCmd(c, "run", "--stop-signal", "SIGUSR1", "-d", "busybox", "/bin/sh", "-c", `trap 'echo "exit trapped"; exit 0' USR1; while true; do sleep 1; done`)
  286. containerID := strings.TrimSpace(out)
  287. c.Assert(waitRun(containerID), checker.IsNil)
  288. dockerCmd(c, "stop", containerID)
  289. out, _ = dockerCmd(c, "logs", containerID)
  290. c.Assert(out, checker.Contains, "exit trapped", check.Commentf("Expected `exit trapped` in the log"))
  291. }
  292. func (s *DockerSuite) TestRunSwapLessThanMemoryLimit(c *check.C) {
  293. testRequires(c, memoryLimitSupport)
  294. testRequires(c, swapMemorySupport)
  295. out, _, err := dockerCmdWithError("run", "-m", "16m", "--memory-swap", "15m", "busybox", "echo", "test")
  296. expected := "Minimum memoryswap limit should be larger than memory limit"
  297. c.Assert(err, check.NotNil)
  298. c.Assert(out, checker.Contains, expected)
  299. }
  300. func (s *DockerSuite) TestRunInvalidCpusetCpusFlagValue(c *check.C) {
  301. testRequires(c, cgroupCpuset)
  302. sysInfo := sysinfo.New(true)
  303. cpus, err := parsers.ParseUintList(sysInfo.Cpus)
  304. c.Assert(err, check.IsNil)
  305. var invalid int
  306. for i := 0; i <= len(cpus)+1; i++ {
  307. if !cpus[i] {
  308. invalid = i
  309. break
  310. }
  311. }
  312. out, _, err := dockerCmdWithError("run", "--cpuset-cpus", strconv.Itoa(invalid), "busybox", "true")
  313. c.Assert(err, check.NotNil)
  314. expected := fmt.Sprintf("Error response from daemon: Requested CPUs are not available - requested %s, available: %s", strconv.Itoa(invalid), sysInfo.Cpus)
  315. c.Assert(out, checker.Contains, expected)
  316. }
  317. func (s *DockerSuite) TestRunInvalidCpusetMemsFlagValue(c *check.C) {
  318. testRequires(c, cgroupCpuset)
  319. sysInfo := sysinfo.New(true)
  320. mems, err := parsers.ParseUintList(sysInfo.Mems)
  321. c.Assert(err, check.IsNil)
  322. var invalid int
  323. for i := 0; i <= len(mems)+1; i++ {
  324. if !mems[i] {
  325. invalid = i
  326. break
  327. }
  328. }
  329. out, _, err := dockerCmdWithError("run", "--cpuset-mems", strconv.Itoa(invalid), "busybox", "true")
  330. c.Assert(err, check.NotNil)
  331. expected := fmt.Sprintf("Error response from daemon: Requested memory nodes are not available - requested %s, available: %s", strconv.Itoa(invalid), sysInfo.Mems)
  332. c.Assert(out, checker.Contains, expected)
  333. }
  334. func (s *DockerSuite) TestRunInvalidCPUShares(c *check.C) {
  335. testRequires(c, cpuShare, DaemonIsLinux)
  336. out, _, err := dockerCmdWithError("run", "--cpu-shares", "1", "busybox", "echo", "test")
  337. c.Assert(err, check.NotNil, check.Commentf(out))
  338. expected := "The minimum allowed cpu-shares is 2"
  339. c.Assert(out, checker.Contains, expected)
  340. out, _, err = dockerCmdWithError("run", "--cpu-shares", "-1", "busybox", "echo", "test")
  341. c.Assert(err, check.NotNil, check.Commentf(out))
  342. expected = "shares: invalid argument"
  343. c.Assert(out, checker.Contains, expected)
  344. out, _, err = dockerCmdWithError("run", "--cpu-shares", "99999999", "busybox", "echo", "test")
  345. c.Assert(err, check.NotNil, check.Commentf(out))
  346. expected = "The maximum allowed cpu-shares is"
  347. c.Assert(out, checker.Contains, expected)
  348. }
  349. func (s *DockerSuite) TestRunWithDefaultShmSize(c *check.C) {
  350. testRequires(c, DaemonIsLinux)
  351. name := "shm-default"
  352. out, _ := dockerCmd(c, "run", "--name", name, "busybox", "mount")
  353. shmRegex := regexp.MustCompile(`shm on /dev/shm type tmpfs(.*)size=65536k`)
  354. if !shmRegex.MatchString(out) {
  355. c.Fatalf("Expected shm of 64MB in mount command, got %v", out)
  356. }
  357. shmSize, err := inspectField(name, "HostConfig.ShmSize")
  358. c.Assert(err, check.IsNil)
  359. c.Assert(shmSize, check.Equals, "67108864")
  360. }
  361. func (s *DockerSuite) TestRunWithShmSize(c *check.C) {
  362. testRequires(c, DaemonIsLinux)
  363. name := "shm"
  364. out, _ := dockerCmd(c, "run", "--name", name, "--shm-size=1G", "busybox", "mount")
  365. shmRegex := regexp.MustCompile(`shm on /dev/shm type tmpfs(.*)size=1048576k`)
  366. if !shmRegex.MatchString(out) {
  367. c.Fatalf("Expected shm of 1GB in mount command, got %v", out)
  368. }
  369. shmSize, err := inspectField(name, "HostConfig.ShmSize")
  370. c.Assert(err, check.IsNil)
  371. c.Assert(shmSize, check.Equals, "1073741824")
  372. }
  373. func (s *DockerSuite) TestRunTmpfsMounts(c *check.C) {
  374. // TODO Windows (Post TP4): This test cannot run on a Windows daemon as
  375. // Windows does not support tmpfs mounts.
  376. testRequires(c, DaemonIsLinux)
  377. if out, _, err := dockerCmdWithError("run", "--tmpfs", "/run", "busybox", "touch", "/run/somefile"); err != nil {
  378. c.Fatalf("/run directory not mounted on tmpfs %q %s", err, out)
  379. }
  380. if out, _, err := dockerCmdWithError("run", "--tmpfs", "/run:noexec,nosuid,rw,size=5k,mode=700", "busybox", "touch", "/run/somefile"); err != nil {
  381. c.Fatalf("/run failed to mount on tmpfs with valid options %q %s", err, out)
  382. }
  383. if _, _, err := dockerCmdWithError("run", "--tmpfs", "/run:foobar", "busybox", "touch", "/run/somefile"); err == nil {
  384. c.Fatalf("/run mounted on tmpfs when it should have vailed within invalid mount option")
  385. }
  386. if _, _, err := dockerCmdWithError("run", "--tmpfs", "/run", "-v", "/run:/run", "busybox", "touch", "/run/somefile"); err == nil {
  387. c.Fatalf("Should have generated an error saying Duplicate mount points")
  388. }
  389. }